When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. IEEE Transactions on Information Forensics and Security

    en.wikipedia.org/wiki/IEEE_Transactions_on...

    The IEEE Transactions on Information Forensics and Security is a scientific journal published by the IEEE Signal Processing Society (IEEE SPS). [1] The journal is co-sponsored by several of the subject societies that make up the IEEE: IEEE Communications Society, IEEE Computational Intelligence Society, IEEE Computer Society, IEEE Engineering in Medicine and Biology Society, and the IEEE ...

  3. IEEE Symposium on Security and Privacy - Wikipedia

    en.wikipedia.org/wiki/IEEE_Symposium_on_Security...

    The review process for the conference tends to evaluate the papers on a variety of criteria with a focus on novelty. In 2022, researchers interviewed reviewers from top security conferences like IEEE S&P and found that the review process of the conferences was exploitable due to inconsistent reviewing standards across reviewers.

  4. IEEE Security & Privacy - Wikipedia

    en.wikipedia.org/wiki/IEEE_Security_&_Privacy

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Help; Learn to edit; Community portal; Recent changes; Upload file

  5. IEEE Xplore - Wikipedia

    en.wikipedia.org/wiki/IEEE_Xplore

    IEEE Xplore (stylized as IEEE Xplore) digital library is a research database for discovery and access to journal articles, conference proceedings, technical standards, and related materials on computer science, electrical engineering and electronics, and allied fields.

  6. List of IEEE publications - Wikipedia

    en.wikipedia.org/wiki/List_of_IEEE_publications

    The content in these journals as well as the content from several hundred annual conferences are available in the IEEE's online digital library. [2] The IEEE also publishes more than 750 conference proceedings every year. [3] In addition, the IEEE Standards Association maintains over 1,300 standards in engineering.

  7. The Protection of Information in Computer Systems - Wikipedia

    en.wikipedia.org/wiki/The_Protection_of...

    The following design principles are laid out in the paper: Economy of mechanism: Keep the design as simple and small as possible. Fail-safe defaults: Base access decisions on permission rather than exclusion. Complete mediation: Every access to every object must be checked for authority. Open design: The design should not be secret.

  8. Category:IEEE academic journals - Wikipedia

    en.wikipedia.org/wiki/Category:IEEE_academic...

    IEEE Transactions on Advanced Packaging; IEEE Transactions on Aerospace and Electronic Systems; IEEE Transactions on Antennas and Propagation; IEEE Transactions on Applied Superconductivity; IEEE Transactions on Circuits and Systems I: Regular Papers; IEEE Transactions on Communications; IEEE/ACM Transactions on Computational Biology and ...

  9. Brij B. Gupta - Wikipedia

    en.wikipedia.org/wiki/Brij_B._Gupta

    Brij Bhooshan Gupta is a distinguished professor with the Department of Computer Science and Information Engineering (CSIE), Asia University, Taiwan.He has published over 500 papers in journals/conferences including 35 books and 10 Patents with over 30,000 citations.